This book identifies the vulnerabilities at the physical layer, MAC layer, IP layer, the transport layer and application layer, wireless networks and discusses methods to strengthen security mechanisms and services. Topics covered include intrusion detection, routing protocols secure MAC/PHY, attacks and prevention, immunization, key management, secure group communications and multicast services, safe location, monitoring and surveillance, anonymity, privacy, trust creation and management, redundancy and security and reputable wireless networking. From the back cover This timely volume, visit the site here Wireless network security, provides extensive coverage of wireless security issues for instance cryptographic coprocessors, encryption, key management, authentication, attacks and countermeasures, secure routing, secure media access control, intrusion detection, epidemics, safety performance analysis, security difficulties in applications and a lot more. Contributions identify a number of vulnerabilities in physical layer, MAC layer, IP layer, and transport layer software layer and focus on ways to strengthen security mechanisms and services through the levels. The book includes 15 chapters rigorously arbitrated by eminent international researchers working in this area. The material serves as a useful reference for researchers, graduate students, and professional issues trying to find solutions for wireless and cellular security.
Subscribe to:
Post Comments (Atom)
0 comments:
Post a Comment